Operations Summit

Subscribe


 

Email ARCHIVE

FTC: Progress Being Made on Spam  Dec 21, 2005 3:07 AM By Ken Magill

Despite some troubling developments in e-mail since the Can-Spam Act of 2003 went into effect two years ago, the often-derided federal law has resulted in marketers adopting more best practices

Still Waiting for That E-mail Avalanche  Dec 07, 2005 6:47 PM By Ken Magill

By now it

FTC: ISPs Better at Blocking “Harvesters”  Nov 30, 2005 2:07 AM By Ken Magill

Spammers are as busy as ever harvesting e-mail addresses, but Internet service providers block the vast majority of their attempts to flood consumers’ inboxes, according to a report released this week by the Federal Trade Commission.

How to Build Your Own E-mail Prospecting List  Nov 28, 2005 11:55 PM By MCM staff

The very idea of an e-mail blast to prospects can send shivers up a marketer

Live from ECMOD: E-mail Marketing and the Big Bounce  Nov 27, 2005 7:49 PM By Melissa Dowling

When it comes to e-mail marketing, all bounces, or returned e-mails, are not created equal, says consultant Amy Africa, director of EightByEight. In her Nov. 23 session,

Michigan E-Mail Registry to Go Live Next Week  Nov 04, 2005 7:51 PM By Ken Magill

After a three-month delay, Michigan

Best Bets for online acquisition and retention  Nov 01, 2005 10:30 PM By Polly Bickel Wong

In the world of online marketing, it’s easy to lose focus on the core objective when you’re haggling with search engines, chasing down affiliates, and

DMA Mandates E-mail Authentication  Oct 19, 2005 3:07 AM By MCM staff

The board of directors of the Direct Marketing Association voted to require all
DMA members to use e-mail identification and
authentication protocols.

Keeping it real  Oct 01, 2005 9:30 PM By Ken Magill

The Internet’s biggest mailbox providers, including Yahoo!, Microsoft, and AOL, are moving ahead with sender authentication solutions that will affect

Quick Tips for Improving E-mail Deliverability  Sep 12, 2005 6:43 PM By MCM staff

With all the talk about the numerous sender authentication protocols, it






© 2014, Access Intelligence, LLC. All rights reserved.